Professor Nathan Clarke
Profiles

Professor Nathan Clarke

Professor in Cyber Security and Digital Forensics

School of Engineering, Computing and Mathematics (Faculty of Science and Engineering)

Professor Nathan Clarke can be contacted through arrangement with our Press Office, to speak to the media on these areas of expertise.
  • Information security
  • Biometrics
  • Computer forensics
  • Computing
Biography

Biography

Nathan Clarke is a Professor of Cyber Security and Digital Forensics at the University of Plymouth. He is also an adjunct Professor at Edith Cowan University, Western Australia. His research interests reside in the area of information security, biometrics, forensics and intrusion detection and has over 250 journal papers, conference papers, books, edited books, book chapters and patents. 
He is the past Chair of the IFIP TC11.12 Working Group on the Human Aspects of Information Security & Assurance (2013-2019) and is the co-chair of the long standardising HAISA series of symposiums. Prof Clarke is a chartered engineer, a fellow of the British Computing Society (BCS), a fellow of the Chartered Institute of Information Security, a senior member of the IEEE. 

Qualifications

  • PGCert Learning & Teaching in Higher Education (2005)
  • PhD, "Advanced User Authentication for Mobile Devices" (2004)
  • BEng (Hons) Electronic Engineering (1st Class) (2001)
  • EC Council Certified Ethical Hacker (CEH)
  • EC Council Certified Hacking Forensic Investigator (CHFI)
  • AccessData Certified Examiner (ACE)

Professional membership

  • Fellow of the Chartered Institute of Information Security (FCIIS)
  • Fellow of the British Computing Society (FBCS)
  • Senior Fellow of the Higher Education Academy (SFHEA)
  • Senior Member of the Institute for Electrical and Electronic Engineering (SMIEEE)
  • Chartered Engineer (CEng)

Roles on external bodies

  • Professional Member representative on BCS Council (2022-2025) 
  • Chair, IFIP TC11 Working Group 11.12 Human Aspects of Information Security & Assurance (2013-2019)
  • Member, IFIP TC11 Working Group 11.12 on Human Aspects of Information Security & Assurance (2010-)
  • Member, IFIP TC11 Working Group 11.1 on Information Security Management
  • Member, IFIP TC11 Working Group 11.6 on Identity Management
External Research Council Grant Reviewing:
  • Engineering and Physical Sciences Research Council (EPSRC), UK
  • National Research Foundation (NRF), South Africa
  • National Research Council Canada (NRC), Canada
  • Portuguese Foundation for Science and Technology (FCT), Portugal
  • Technology Foundation STW, The Netherlands
  • Flanders Innovation & Entrepreneurship, Belgium
  • The Royal Society, United Kingdom
  • European Research Council
  • Swiss National Science Foundation
  • Research and Innovation Foundation of Cyprus

Key publications

Clarke N (2021) 'Frictionless User Authentication' in Jajodia S; Samarati P; Yung M Encyclopedia of Cryptography, Security and Privacy Springer , DOI
Vranopoulos G, Clarke N & Atkinson S (2022) 'Addressing big data variety using an automated approach for data characterization' Journal Of Big Data 9, (1) , DOI Open access
Alobaidi H, Clarke N, Li F & AbdulrahmanAlruban (2021) 'Real-World Smartphone-based Gait Recognition' Computers and Security 113, , DOI Open access
Naqvi B, Clarke N & Porras J (2020) 'Incorporating the Human Facet of Security in Developing Systems and Services' Information and Computer Security , DOI Open access
Alotaibi S, Furnell S & Clarke N (2019) 'A Novel Transparent User Authentication Approach for Mobile Applications' Information Security Journal: A Global Perspective 27, (5-6) 292-305 , DOI Open access
Clarke N, Furnell S & Li F (2017) 'A novel privacy preserving user identification approach for network traffic' Computers and Security , DOI Open access
View all publications
Teaching

Teaching

Teaching interests

Module Delivery 
  • COMP3011 Ethical Hacking*
  • COMP3012 Digital Forensics & Malware Analysis*
  • COMP5003 Ethical Hacking*
  • COMP5004 Digital Forensics & Malware Analysis*
  • PUSL3132 Ethical Hacking
Previous Module Delivery: 
  • CNET115 Computer & Information Security* 
  • CNET117 Digital Forensics*
  • CNET335/522 Cybercrime & Forensic Investigation* 
  • SOFT230 Remote Data Access Technology 
  • CNET221 Network Security 
  • CNET232/525 Systems Security* 
  • COMP212 Software Engineering and High Level Programming 
  • COMP223 High Level Programming 
  • CNET338/538 Security for Mobile Systems*
  • CNET336/532 Cryptography & Applications* 
  • CNET520 Applications of Security 
  • CNET531 Intrusion Prevention, Detection & Response* 
  • SEC101 Introduction to Computer Security*
  • SEC102PP Cybersecurity Essentials*
  • SEC201 Digital Forensic Investigation*
  • SEC104 Cybersecurity & Networks*
  • SEC305/505 Digital Forensic Investigation*
  • COMP1002 Cyber Security & Networks*
*Developed module

Staff serving as external examiners

External Teaching Roles:
  • External Examiner, Computer Science/Cyber Security, University of the West of England (2022-2026)
  • External Examiner, BSc (Hons) Cyber Security, Aston University (2021-2025)
  • External Advisor for BSc Computer Science, National Commission for Further and Higher Education, Malta (June 2021)
  • External Advisor for MSc in Artificial Intelligence, National Commission for Further and Higher Education, Malta (March 2020)
  • External Examiner for Undergraduate Programmes in Cyber Security, Edinburgh Napier University (2016-2021)
  • External Examiner for MSc in Cyber Security and Forensics, University of Westminster (2015-2019)
  • External Advisor for Programme Approval of Comp Computer Forensics, Computer Security & Computer Networks, Liverpool John Moores University (December 2015)
  • External Examiner for MSc in Cybersecurity and Management, University of Warwick (2012 – 2017)
  • Programme Approval of MComp/BSc (Hons) Computer Security with Forensics, Sheffield Hallam University (April 2011)
  • Programme Approval of BSc (Hons) Computer Forensics, Liverpool John Moores University (Beckett College) (March 2011)
  • Programme Approval of MSc Computer Systems and MSc Computer Applications, University of Bedfordshire (June 2010)
  • Programme Approval of MSc Web Technologies, MSc Media Technology Management and MSc Sound Engineering, Birmingham City University (May 2010)
  • External Examiner for MSc Computer Applications in Accounting and MSc Computer Systems Auditing, London Metropolitan University (2009 - 2013)
  • Programme Approval of BSc (Hons) Mobile Communications Technology, University of Central England (March 2007)
  • External Examiner for MSc Computer Forensics & Security, University of Bedfordshire, UK (2007-2010)
  • Programme Approval of BSc (Hons) Computing & Information Security, Sheffield Halam University (March 2008)
Research Degree Examiner: 
  • 2024, PhD, Detecting the Command and Control Communication of Banking Malware using Artificial Intelligence, University of Greenwich
  • 2024, PhD, An Exploration of Information Security Practices within UK Primary, Secondary and Further Education Institutions, University of Portsmouth 
  • 2023, PhD, Development of Big Data Anonymization Framework using DNA Computing, Visvesvaraya Technological University
  • 2023, PhD, The Social, Legal and Technical Perspective of Cyberstalking in India, University of Bedfordshire
  • 2023, PhD, The Advanced Framework for Evaluating Remote Agents: A Framework for Digital Forensic Practitioners, Curtin University
  • 2023, PhD, Labrandor – A framework for guiding the development of dynamically generated penetration testing laboratories, Flinders University, Australia
  • 2023, PhD, Configuration Management of Distributed Systems over Unreliable and Hostile Networks, University of Westminster, UK
  • 2023, PhD, Adaptive Cybersecurity Training Framework for Social Media Risks, University of Plymouth (Internal)
  • 2023, PhD, Wearable In-Ear Electroencephalography based System for Biometric Authentication, City University
  • 2022, PhD, Identifying Ransomware through Statistical and Behavioural Analysis, University of Kent
  • 2022, PhD, Secure PIN-Entry Method Resistant to Shoulder-Surfing and Recording Attacks, Universiti Malaya, Malaysia
  • 2022, DPhil Thesis, An Information Privacy-Compliance Model based upon Configurable Software Objects, Nelson Mandela University, South Africa
  • 2022, PhD, Optimising Flow Routing using Network Performance Analysis, University of Plymouth (Internal)
  • 2021, PhD Thesis, Granular Multi-Label Network Traffic Classification using Incremental Learning and Classifer Chains, Universiti Malaya, Malaysia 
  • 2021, PhD Thesis, Information Assurance in Saudi Healthcare Entities, University of Southampton
  • 2021, PhD Thesis, A Framework for Understanding and Establishing an Effective Information Security Culture, University of Plymouth (Internal)
  • 2021, PhD Thesis, Tracing Learning Environment in Java Programming Language, University of Plymouth (Internal)
  • 2020, Professional Doctorate, The Professional Identity of Security Risk Intelligence Analysts in the Private Sector: An International Perspective, University of Portsmouth
  • 2020. PhD Thesis, Building Cyber Defense Training Capacity, University of Plymouth (Internal)
  • 2020, PhD Thesis. Continuous Authentication on Mobile Devices, City University of London
  • 2020, PhD Thesis, Risk Communication Framework for Parental Control in the Digital World, University of Plymouth (Internal)
  • 2019, PhD Thesis, Strengthening Password-Based Authentication, Royal Holloway, University of London, UK
  • 2019, PhD Thesis, Relevance Feedback Optimization for Digital Forensic Investigations, The British University in Dubai, UAE
  • 2019, PhD Thesis, Advancing User Authentication and Access Management, University of Plymouth, UK (Internal)
  • 2019, PhD Thesis, Towards a Standardized Attack Graph Visual Syntax, The University of Warwick, UK
  • 2019, PhD Thesis, An Evaluation and Enhancement of Public Cyber Security Awareness, University of Plymouth, UK (Internal)
  • 2019, PhD Thesis, Honeypot for Wireless Sensor Networks, University of Plymouth, UK (Internal)
  • 2019, PhD Thesis, Social Engineering Attack Detection Model, University of Pretoria, South Africa
  • 2018, PhD Thesis, System Steganalysis: Implementation Vulnerabilities and Side Channel Attacks against Digital Steganography Systems, University of Kent, UK
  • 2018, PhD Thesis, An Investigation Framework for the IoT Forensics, University of Southampton, UK
  • 2018, PhD Thesis, Towards a framework to promote the development of secure and usable online information security applications, University of South Africa, South Africa
  • 2018, PhD Thesis, A Multi-Domain Approach for Insider Threat Modelling and Security Compliance, University of Bristol, UK
  • 2017, PhD Thesis, Big Data Forensic as a Service, University of South Wales
  • 2017, PhD Thesis, A Novel Human Visual Psychophysics Based Approach to Distinguish Between Human Users and Computer Robots, City University
  • 2017, PhD Thesis, A Method to Enhance the Accuracy of Digital Forensics in the Absence of Complete Evidence in Saudi Arabia, De Montfort University
  • 2017, PhD Thesis, A Malware Analysis and Detection System for Mobile Devices, University of Malaya
  • 2016, PhD Thesis, A Generic Smartphone Forensic Investigation Process Model, University Putra Malaysia
  • 2016, PhD Thesis, The Role of Security and its Antecedents in E-Government Adoption, Plymouth University (Internal)
  • 2016, PhD Thesis, Defending Against Network and Application Level Denial of Service Attacks, Indian Institute of Technology, Patna, India
  • 2016, PhD Thesis, Opportunities & Risks in Online Gaming Environments, Plymouth University (Internal)
  • 2015, PhD Thesis, Techniques for Analysis & Detection of Android Malware, Malaviya National Institute of Technology, India.
  • 2015, PhD Thesis, Asymmetric Encryption for Wiretap Channels, Plymouth University (Internal)
  • 2015, PhD Thesis, Identifying Memory Address Disclosures, De Montfort University, UK
  • 2015, PhD Thesis, Resolving Semantic Disparities in Digital Forensics, University of Pretoria, South Africa
  • 2015, PhD Thesis, User Controlled Identity Management Systems using Mobile Devices, Glasgow University, UK
  • 2015, PhD Thesis, Secure BPMN – A Graphical Extension for BPMN 2.0 Based pm a Reference Model of Information Assurance and Security, Cardiff University, UK
  • 2015, PhD Thesis, Improved Composability of Software Components through Parallel Hardware Platforms for In-Car Multimedia Systems, University of Plymouth (Internal)
  • 2015, PhD Thesis, A Near-Miss Analysis Model for Improving the Forensic Investigation of Software Failures, University of Pretoria, South Africa
  • 2015, MTech Thesis, Guidelines to Address the Human Factor in the South African National Research and Education Network Beneficiary Institutions.
  • 2015, PhD Thesis, Establishing an Information Security Awareness and Culture, Plymouth University (Internal)
  • 2014, PhD Thesis, Context-Aware Attribute-Based Techniques for Data Security and Access Control in Mobile Cloud Environment, City University, UK
  • 2014, DPhil Thesis, A Public Safety, Participatory Crowdsourcing Smart City Model for a Developing Country, University of Fort Hare, South Africa
  • 2014, PhD Thesis, The Practical Implementation of Optimal and Pseudo-Optimal Routing Algorithms, Glyndwr University, United Kingdom
  • 2014, PhD Thesis, Anonymous Authenticated Announcement Schemes in Vehicular Ad Hoc Networks, Royal Holloway, University of London
  • 2014, PhD Thesis, Method for the Adoption of Information Technology Governance, Risk Management and Compliance in Swiss Hospitals, Plymouth University (Internal)
  • 2013, MSc Thesis, Forensic Evidence Isolation in Clouds, University of Pretoria, South Africa
  • 2013, PhD Thesis, Digital Forensics: An Integrated Approach for the Investigation of Cyber/Computer Related Crimes, University of Bedfordshire
  • 2013 Service Quality and Profit Control in Utility Computing Service Life Cycles, PhD Thesis, Plymouth University (Internal Examiner)
  • 2012 The Advanced Data Acquisition Model (ADAM): A Process Model for Digital Forensic Practice, PhD Thesis, Murdoch University, Australia
  • 2012 Security Usability in IT Systems, MPhil Thesis, Plymouth University (Internal Examiner) 
  • 2011 Behavioural Profiling in Mobile Neworks, PhD Thesis, University of Plymouth (Internal Examiner), UK
  • 2010 An Investigation into Remote Transactions, PhD Thesis, Edith Cowan University, Australia
  • 2010 Intrusion Detection Method using a Combination of Neural Network Algorithms, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
  • 2010 Parameter Based Identification, Authentication and Authorisation Method for Mobile Devices, PhD Thesis, City University, London, UK
  • 2010 An Automatic Bank System for Client Credit Rating, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK
  • 2009 Smartcard Architecture for Dynamic and Secure Authentication, MSc, University of Pretoria, South Africa 
  • 2008 Models and Methods of Information Security Risks Assessment in the Circumstances of Input Information Ambiguity, MPhil Thesis, Wessex Institute of Technology, University of Wales, UK 
  • 2008 Adoption of Criminal Profiling to Combat Hacking, MPhil Thesis, University of Plymouth, UK - Internal Examiner 
  • 2007 Establishing Information Security Culture in Australian Small and Medium Enterprises, PhD Thesis, Deakin University, Australia 
  • 2007 A Key Management Framework for Secure Group Communication in Wireless Mobile Environments, PhD Thesis, Royal Holloway, University of London, UK 
  • 2006 The Effectiveness of Graphical Authentication: An Exploratory Study, PhD Thesis, Deakin University, Australia 
  • 2006 Ontology Modelling for the Information Sharing Process within the Labour Market, MPhil Thesis, Wessex Institute of Technology, UK 
  • 2006 Corporate Information Risk: An Information Security Governance Framework, MTech Dissertation, Nelson Mandela Metropolitan University, South Africa.
Research

Research

Research interests

  • Artificial Intelligence & Cyber Security
  • Biometric Authentication
  • Digital Forensics
  • Cyber security
  • Information Systems Security
  • Intrusion Detection Systems
  • Security Management and Risk Assessment
  • Security Education and Awareness

Research groups

Research degrees awarded to supervised students

Completed PhD Project Supervision as Director of Studies:
  1. Dr Fudong Li, Intrusion Prevention and Detection for Mobile Systems (2012)
  2. Dr Shuhaili Talib, Personalising Information Security Education (2013)
  3. Dr Hataichanok Saevanee, Enhancing Authentication over a Touch Screen Interface (2014)
  4. Dr Sevasti Karatzouni, Non-Intrusive Continuous User Authentication for Mobile Devices (2014)
  5. Dr Mahmood Al Fahdi, Automated Digital Forensics & Cybercrime Profiling (2016)
  6. Dr Christopher Kosmas, Secure tracking system for next generation CIT products (2014)
  7. Dr Salam Ketab, E-Invigilator of E-Assessment (2017)
  8. Dr Saad Alqahtany, A Forensically-Enabled Cloud Computing Architecture (2017)
  9. Dr Gaseb Alotibi, Behavioural Monitoring for Network Communications (2017)
  10. Dr Abdulwahid Al Abdulwahid, Federated Authentication using the Cloud (Cloud Aura) (2017)
  11. Dr Athanassios Triantafyllidis, eLearning Web-Based Applications: Enhancing Productivity and Commercial Value (2017)
  12. Dr Burhan Al-Bayati, Continuous Identity Verification in Cloud Computing Services (2018)
  13. Dr Hussam Mohammed, Digital Forensic Analysis of Big Data (2018)
  14. Dr Manal Alohali, Information Security Risk Assessment for The General Public (2018)
  15. Dr Leith Abed, Securing Cloud Storage by Transparent Biometric Cryptography (2019)
  16. Dr Hiba Al-Kawaz, Forensic Facial Recognition of Multimedia Files (2019)
  17. Dr Hind Al-Obaidi, Transparent Authentication Utilising Gait Recognition (2019)
  18. Dr Timibloudi Stephen Enamamu, Bioelectrical User Authentication (2019)
  19. Dr Shahlaa Mashhadani, Image Forensics (2019)
  20. Dr Abdulrahman Alruban, Applying biometrics to digital forensics (2020)
  21. Dr Dany Joy, An Intelligent Network Forensic Analyzer (2020)
  22. Dr Fayez Alotaibi, Improving Cyber Security Management and Awareness for Home Users (2020)
  23. Dr Aziz Alshehri, A Privacy Enhancing Framework for Mobile Devices (2020)
  24. Dr Abdulaziz Altamimi, Author Identification of Text Limited Messages (2020)
  25. Dr Neamah Al-Naffakh, Wearable Computing and Transparent Authentication (2020)
  26. Dr Georgios Vranopoulos, Tackling Big Data Variety using Metadata (2022)
Completed PhD Project Supervision as Supervisor:
  1. Dr Shukor Razak, A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks (2007)
  2. Dr Vassilis Dimopoulos, Effective Information Assurance with Risk Management (2007)
  3. Dr Gina C Tjhai, Anomaly-Based Correlation of IDS Alarms (2011)
  4. Dr Tarik Ibrahim, Improving Intrusion Prevention, Detection and Response (2011)
  5. Dr Nor Badrul Anuar Jumaat, Incident Prioritisation for Intrusion Response Systems (2012)
  6. Dr Garrett Smiley, Investigating the Role of Multibiometric Authentication on Professional Certification E-Examination (2013)
  7. Dr Witold Thaul, The support of learning processes via personal knowledge management Education (2013)
  8. Dr Frank Doelitzscher, Security and Privacy for Cloud Computing (2014)
  9. Dr Chris Hocking, Authentication Aura (2015)
  10. Dr Hanna Shauchenka, Marketing of virtual Universities (Atlantis University) – Application of Quantitative Analysis (2015)
  11. Dr Thomas Rübsamen, Privacy Protection in Cloud Computing (2016)
  12. Dr Mutlaq Alotaibi, User's behaviour with Organisational Information Security Policies (2017)
  13. Dr Saud Nejr Alotaibi, Taxonomy of Application-Based Behaviour Authentication for Mobile Security (2019)
  14. Dr Reem Alkanhel, Designing a usable security framework for IoT (2019)
  15. Dr Samah Alshathri, Energy Consumption Optimisation in Cloud Computing Data Centres (2020)
  16. Dr Stefan Frey, Autonomic SLA Management as a Service (2020)
  17. Dr Faisal Shaman, User Traffic Profiling in Computer Networks (2020)
  18. Dr Hendrik Kuijs, A Platform as a Service Framework for Ambient Assisted Living Services (2023)
  19. Dr Thomas Rieger, Making and Success Factors for the Use of Big Data & Analytics Methods and Technologies (2023)
  20. Dr Holger Gantikow, Secure High Performance Computing provided as PaaS (2023)

Grants & contracts

  • European Research Development Fund. EPIC 2. 2020-2023. €3.3M (Total Award: €4.1M)
  • Research England Development Fund. Cyber-Ship Lab. 2019-2022: £1.682 M (Total Award: £3M)
  • EU Horizon 2020. Foresight. 2019-2022: €290,000 (Total Award: €6M)
  • EU Horizon 2020. Cyber-Trust. 2017-2020: €398,000 (Total Award: €3M)
  • Knowledge Transfer Partnership. Essential 6 Ltd. 2015: £124,000
  • Security Consultancy. Kernow Health Solutions. 2014: £5000
  • EPSRC. Identifying and Responding to Human and Software Behaviours in a Changing Cyber Threat Landscape. 2013: £173,383 (Total Award: £1.0M)
  • Teaching Fellowship Award – e-Invigilator. Plymouth University. 2012: £8100
  • EU Framework 7 Grant. Centre of Excellence in Cybercrime and Forensics: 2012: £7800 (Total Award: £800k)
  • EU Framework 7 Grant. Geryon. 2011: €478K (Total Award: €2.5M)
  • EU Framework 7 Grant. Space Data Routers. 2010: £220,000 (Total Award: £1.6)
  • Knowledge Transfer Partnership. Absolute Software Limited. 2010: £183,094
  • Knowledge Transfer Partnership. K2 Medical Systems. 2008: £115,804.
  • Teaching Fellowship Award – Peer Assessment. University of Plymouth. 2008: £4900
  • Knowledge Transfer Partnership. Spinnaker International. 2008: £141,599
  • Knowledge Transfer Partnership. Westland Geoprojects Limited. 2008: £109,633
  • DTI Funded project into Behavioural Monitoring of Network Communications. 2007: £40,000
  • End Point Compliance. Symantec.2007: £7,000
  • Flexible and non-intrusive user authentication for mobile devices. EduServ Foundation. 2006: £80,390
  • Knowledge Transfer Partnership. Parker Hannifin 2005: £174,000
  • Subscriber Authentication via Keystroke Analysis on a mobile handset. Orange Personal Communication Services Limited. 2004. £19,814
  • Biometric Terminal, Phase 1. Orange Personal Communication Services Limited. 2003: £55,000
  • PC Integrity Testing. Plymouth Trading Standards. 2003-2004: £1,250
  • WinCPR Software Development. SAHFOS. 2002: £4,000
Publications

Publications

Key publications

Clarke N (2021) 'Frictionless User Authentication' in Jajodia S; Samarati P; Yung M Encyclopedia of Cryptography, Security and Privacy Springer , DOI
Vranopoulos G, Clarke N & Atkinson S (2022) 'Addressing big data variety using an automated approach for data characterization' Journal Of Big Data 9, (1) , DOI Open access
Alobaidi H, Clarke N, Li F & AbdulrahmanAlruban (2021) 'Real-World Smartphone-based Gait Recognition' Computers and Security 113, , DOI Open access
Naqvi B, Clarke N & Porras J (2020) 'Incorporating the Human Facet of Security in Developing Systems and Services' Information and Computer Security , DOI Open access
Alotaibi S, Furnell S & Clarke N (2019) 'A Novel Transparent User Authentication Approach for Mobile Applications' Information Security Journal: A Global Perspective 27, (5-6) 292-305 , DOI Open access
Clarke N, Furnell S & Li F (2017) 'A novel privacy preserving user identification approach for network traffic' Computers and Security , DOI Open access

Key publications are highlighted

Journals
Articles
Vranopoulos G, Clarke N & Atkinson S (2023) 'Big Data Confidentiality: An Approach Toward Corporate Compliance Using a Rule-Based System' Big Data , DOI Open access
Clarke N & Furnell S (2023) 'Editorial: Human aspects of cyber security' Information & Computer Security 31, (3) 265-266 , DOI
Vranopoulos G, Clarke N & Atkinson S (2022) 'Addressing big data variety using an automated approach for data characterization' Journal Of Big Data 9, (1) , DOI Open access
Alobaidi H, Clarke N, Li F & AbdulrahmanAlruban (2021) 'Real-World Smartphone-based Gait Recognition' Computers and Security 113, , DOI Open access
Naqvi B, Clarke N & Porras J (2020) 'Incorporating the Human Facet of Security in Developing Systems and Services' Information and Computer Security , DOI Open access
Alotaibi F, Clarke N & Furnell S (2020) 'A novel approach for improving information security management and awareness for home environments' Information and Computer Security , DOI Open access
Da Veiga A, Vorster R, Li F, Clarke N & Furnell SM (2019) 'Comparing the protection and use of online personal information in South Africa and the United Kingdom in line with data protection requirements' Information & Computer Security 28, (3) 399-422 , DOI
Fajardo JO, Liberal F, Li F, Clarke N & Mkwawa I-H (2019) 'End-to-middle-to-end solution for IMS media plane security' Electronic Commerce Research 19, (3) 719-746 , DOI Open access
Ali M, Shiaeles S, Clarke N & Kontogeorgis D (2019) 'A proactive malicious software identification approach for digital forensic examiners' Journal of Information Security and Applications , DOI Open access
Alotaibi S, Furnell S & Clarke N (2019) 'A Novel Transparent User Authentication Approach for Mobile Applications' Information Security Journal: A Global Perspective 27, (5-6) 292-305 , DOI Open access
Alotaibi M, Furnell SM & Clarke N (2019) 'A Framework for Reporting and Dealing with End-User Security Policy Compliance' Information and Computer Security 27, (1) 2-25 , DOI Open access
Alshathri S, Ghita B & Clarke N (2018) 'Sharing with live migration energy optimization scheduler for cloud computing data centers' Future Internet 10, (9) , DOI Open access
Furnell S & Clarke N (2018) 'Inhabiting the Biometric Society' ITNOW 60, (3) 42-43 , DOI
Furnell S & Clarke N (2018) 'Guest editorial' Information & Computer Security 26, (3) 262-263 , DOI
Clarke N, Alohali M, Li F & Furnell S (2018) 'Identifying and Predicting the Factors Affecting End-Users’ Risk-Taking Behavior' Information and Computer Security 26, (3) 306-326 , DOI Open access
Mashhadani S, Al-kawaz H, Clarke N, Furnell S & Li F (2018) 'The Design of a Multimedia-Forensic Analysis Tool (M-FAT)' International Journal of Multimedia and Image Processing 8, (1) 398-408 , DOI Open access
Alohali M, Clarke N & Furnell S (2018) 'The Design and Evaluation of a User-Centric Information Security Risk Assessment and Response Framework' International Journal of Advanced Computer Science and Applications 9, (10) , DOI Open access
Clarke N, Furnell S & Li F (2017) 'A novel privacy preserving user identification approach for network traffic' Computers and Security , DOI Open access
Ketab SS, Clarke NL & Dowland PS (2017) 'A Robust e-Invigilation System Employing Multimodal Biometric Authentication' International Journal of Information and Education Technology 7, (11) 796-802 , DOI Open access
Alotibi G, Clarke N, Li F & Furnell S (2016) 'Identifying Users by Network Traffic Metadata' International Journal of Chaotic Computing 4, (2) 103-112 , DOI Open access
Alruban A, Clarke N, Li F & Furnell S (2016) 'Leveraging Biometrics for Insider Misuse Identification' International Journal on Cyber Situational Awareness 1, (1) 130-151 , DOI Open access
Al-Naffakh N (2016) 'A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches' International Journal for Information Security Research 6, (3) , DOI Open access
Alotaibi S, Furnell S & Clarke N (2016) 'MORI: An Innovative Mobile Applications Data Risk Assessment Model' Journal of Internet Technology and Secured Transaction 5, (3/4) , DOI Open access
Al Fahdi M, Clarke NL, Li F & Furnell SM (2016) 'A suspect-oriented intelligent and automated computer forensic analysis' DIGITAL INVESTIGATION 18, 65-76 Author Site , DOI Open access
Furnell S & Clarke N (2016) 'Guest editorial' Information & Computer Security 24, (2) 138-138 , DOI
Clarke N, Symes J, Saevanee H & Furnell S (2016) 'Awareness of Mobile Device Security' International Journal of Mobile Computing and Multimedia Communications 7, (1) 15-31 , DOI
Al Abdulwahid A, Clarke N, Stengel I, Furnell S & Reich C (2015) 'Continuous and transparent multimodal authentication: reviewing the state of the art' Cluster Computing 19, (1) 455-474 , DOI Open access
Alqahtany S, Clarke N, Furnell S & Reich C (2015) 'A forensic acquisition and analysis system for IaaS' Cluster Computing 19, (1) 439-453 , DOI Open access
Alotaibi S, Furnell S & Clarke N (2015) 'A Fine-Grained Analysis of User Activity on Mobile Applications: The Sensitivity Level Perception' International Journal for Information Security Research 5, (3) 591-599 , DOI
Saevanee H, Clarke N, Furnell S & Biscione V (2015) 'Continuous user authentication using multi-modal biometrics' Computers & Security 53, 234-246 , DOI Open access
Tsimperidis I, Katos V & Clarke N (2015) 'Language-independent gender identification through keystroke analysis' Information & Computer Security 23, (3) 286-301 , DOI
Kasiaras D, Zafeiropoulos T, Clarke N & Kambourakis G (2014) 'Android Forensic Data Analyzer (AFDA): An Opensource Tool to Automatize Event Correlation Analysis on Android Devices' International Journal for Information Security Research 4, (4) 501-509 , DOI
Fajardo JO, Liberal F, Li F, Clarke N & Mkwawa I-H (2014) 'End-to-middle-to-end solution for IMS media plane security' Electronic Commerce Research , DOI Open access
Furnell S, van Niekerk J & Clarke N (2014) 'The price of patching' Computer Fraud & Security 2014, (8) 8-13 , DOI
Furnell S & Clarke N (2014) 'Biometrics: making the mainstream' Biometric Technology Today 2014, (1) 5-9 , DOI
Anuar NB, Papadaki M, Furnell S & Clarke N (2013) 'A response selection model for intrusion response systems: Response Strategy Model (RSM)' Security and Communication Networks 7, (11) 1831-1848 , DOI
Li F, Clarke N, Papadaki M & Dowland P (2013) 'Active authentication for mobile devices utilising behaviour profiling' International Journal of Information Security 13, (3) 229-244 , DOI Open access
Komatsu A, Takagi D & Takemura T (2013) 'Human aspects of information security' Information Management & Computer Security 21, (1) 5-15 , DOI
Hocking CG, Furnell SM, Clarke NL & Reynolds PL (2013) 'Co-operative user identity verification using an Authentication Aura' COMPUTERS & SECURITY 39, 486-502 , DOI
Doelitzscher F, Reich C, Knahl M, Passfall A & Clarke N (2012) 'An agent based business aware incident detection system for cloud environments' Journal of Cloud Computing: Advances, Systems and Applications 1, 9-9
Damopoulos D, Menesidou SA, Kambourakis G, Papadaki M, Clarke N & Gritzalis S (2012) 'Evaluation of anomaly-based IDS for mobile devices using machine learning classifiers' SECURITY AND COMMUNICATION NETWORKS 5, (1) 3-14 , DOI
Furnell S & Clarke N (2012) 'Power to the people? The evolving recognition of human aspects of security' Computers & Security
Tryfonas T & Clarke N (2011) 'Special issue from the sixth international annual workshop on digital forensics and incident analysis' International Journal of Digital Crime and Forensics 3, (3)
Talib S, Clarke NL & Furnell SM (2011) 'Establishing A Personalized Information Security Culture' International Journal of Mobile Computing and Multimedia Communications (IJMCMC) 3, 63-79
Li F, Clarke N, Papadaki M & Dowland P (2011) 'Misuse detection for mobile devices using behaviour profiling' International Journal of Cyber Warfare and Terrorism (IJCWT) 1, 41-53
Tjhai GC, Furnell SM, Papadaki M & Clarke NL (2010) 'A preliminary two-stage alarm correlation and filtering system using SOM neural network and K-means algorithm' COMPUTERS & SECURITY 29, (6) 712-723 Author Site , DOI
Spafford EH (2010) 'Editorial' Computers & Security 29, (6) 641-642 , DOI
Razak SA, Samian N, Ma'arof MA, Furnell SM, Clarke NL & Brooke PJ (2009) 'A Friend Mechanism for Mobile Ad Hoc Networks' Journal of Information Assurance and Security 4, (4) 440-448
Botha RA, Furnell SM & Clarke NL (2009) 'From desktop to mobile: Examining the security experience' COMPUTERS & SECURITY 28, (3-4) 130-137 , DOI
Razak SA, Furnell SM, Clarke NL & Brooke PJ (2008) 'Friend-assisted intrusion detection and response mechanisms for mobile ad hoc networks' AD HOC NETWORKS 6, (7) 1151-1167 Author Site , DOI
Furnell S & Clarke N (2007) 'Guest editorial' Information Management & Computer Security 15, (5) , DOI
Clarke NL (2007) 'The Application of Signature Recognition to Transparent Handwriting Verification for Mobile Devices' Information Management & Computer Security 15 (3), 214-225 , DOI
Clarke NL & Furnell SM (2007) 'Advanced user authentication for mobile devices' COMPUTERS & SECURITY 26, (2) 109-119 , DOI
Clarke NL & Furnell SM (2006) 'A Composite User Authentication Architecture for Mobile Devices' Journal of Information Warfare 5, (2) 11-29
Clarke NL & Furnell SM (2005) 'Authentication of users on mobile telephones - A survey of attitudes and practices' COMPUTERS & SECURITY 24, (7) 519-527 , DOI
Clarke NL & Furnell SM (2005) 'Biometrics - The promise versus the practice' Computer Fraud and Security September, 12-16
Clarke NL & Furnell SM (2005) 'Biometrics: No silver bullets' Computer Fraud and Security August, 9-14
Furnell SM, Katos V & Clarke NL (2005) 'The role of academic qualifications in the IT security profession' DATAWATCH, Information Systems Audit and Control Association (ISACA) winter, 8-15
Clarke NL (2003) 'Keystroke Dynamics on a Mobile Handset: A Feasibility Study' Information Management & Computer Security 11 (4), 161-166 , DOI
Furnell SM, Clarke NL & Karatzouni S 'Beyond the PIN: Enhancing user authentication for mobile devices' Computer Fraud & Security 2008, (8) 12-17
Levy Y, Ramim MM, Furnell SM & Clarke NL 'Comparing intentions to use university-provided vs vendor-provided multibiometric authentication in online exams' Campus-Wide Information Systems 28, (2) 102-113
Books
Furnell S & Clarke N (2023) Human Aspects of Information Security and Assurance 17th IFIP WG 11.12 International Symposium, HAISA 2023, Kent, UK, July 4–6, 2023, Proceedings. Springer Nature
Clarke N & Furnell S (2022) Human Aspects of Information Security and Assurance 16th IFIP WG 11.12 International Symposium, HAISA 2022, Mytilene, Lesbos, Greece, July 6–8, 2022, Proceedings. Springer Nature
Furnell S & Clarke N (2021) Human Aspects of Information Security and Assurance 15th IFIP WG 11.12 International Symposium, HAISA 2021, Virtual Event, July 7–9, 2021, Proceedings. Springer
Clarke N & Furnell S (2020) Human Aspects of Information Security and Assurance 14th IFIP WG 11.12 International Symposium, HAISA 2020, Mytilene, Lesbos, Greece, July 8–10, 2020, Proceedings. Springer
Clarke N (2011) Transparent User Authentication. Springer Verlag
CLARKE N (2011) Transparent user authentication: biometrics, RFID and behavioural profiling [e-book].
Clarke N (2010) Computer Forensics. It Governance Pub
Chapters
Clarke NL, Ghita BV & Furnell SM (2021) 'Delay-tolerant networks (DTNs) for deep-space communications' Advances in Delay-Tolerant Networks (DTNs) Elsevier 47-58 , DOI
Clarke N (2021) 'Frictionless User Authentication' in Jajodia S; Samarati P; Yung M Encyclopedia of Cryptography, Security and Privacy Springer , DOI
Gantikow H, Reich C, Knahl M & Clarke N (2020) 'Rule-Based Security Monitoring of Containerized Environments' Cloud Computing and Services Science 9th International Conference, CLOSER 2019, Heraklion, Crete, Greece, May 2–4, 2019, Revised Selected Papers Springer International Publishing 66-86 , DOI Open access
Clarke N (2018) 'Biometric systems, modalities and attacks' in Awad AI; Fairhurst M Information Security Foundations, Technologies and Applications
Clarke NL, Ghita BV & Furnell SM (2015) '3 Delay-tolerant networks (DTNs) for deep-space communications' Advances in Delay-Tolerant Networks (DTNs) Elsevier 49-60 , DOI
Clarke N, Ghita B & Furnell S (2014) 'Delay-tolerant networks (DTNs) for deep-space communications' in Rodrigues JJPC Advances in Delay-tolerant Networks (DTNs) Architecture and Enhanced Performance Elsevier
Clarke NL, Dowland P & Furnell SM (2008) 'User Authentication Technologies' in Furnell S; Katsikas SK; Lopez J; Patel A Securing information and communications systems Artech House Publishers 35-59
Conference Papers
Hölscher D, Reich C, Knahl M, Gut F & Clarke N (2024) 'Pix2Pix Hyperparameter Optimisation Towards Ideal Universal Image Quality Index Score' Springer Nature Switzerland 862-882 , DOI
Stodt J, Reich C & Clarke N (2023) 'A Novel Metric for XAI Evaluation Incorporating Pixel Analysis and Distance Measurement' 2023 IEEE 35th International Conference on Tools with Artificial Intelligence (ICTAI) 1-/-1/20231-/-1/2023IEEE , DOI
Alshumrani A, Clarke N & Ghita B (2023) 'A Unified Forensics Analysis Approach to Digital Investigation' Academic Conferences International Ltd 466-475 , DOI Open access
Stodt J, Ghajar FG, Reich C & Clarke N (2023) 'Verifiable Machine Learning Models in Industrial IoT via Blockchain' Springer Nature Switzerland 66-84 , DOI
Hölscher D, Reich C, Gut F, Knahl M & Clarke N (2023) 'Pix2Pix Hyperparameter Optimisation Prediction' Elsevier BV 1009-1018 , DOI
Kuijs H, Reich C, Knahl M, Clarke N & Ognjanovic I (2022) 'The Need for Emergency-Based Access Control in AAL Systems' 2022 11th Mediterranean Conference on Embedded Computing (MECO) 6-/-0/20226-/-0/2022IEEE , DOI
Stodt J, Reich C & Clarke N (2022) 'Explainable AI with Domain Adapted FastCAM for Endoscopy Images' Springer International Publishing 57-64 , DOI
Hölscher D, Reich C, Knahl M, Gut F & Clarke N (2022) 'Surface Quality Augmentation for Metalworking Industry with Pix2Pix' Elsevier BV 897-906 , DOI Open access
Altamimi A, Clarke N, Furnell S & Li F (2019) 'Multi-Platform Authorship Verification' CECC 2019: Central European Cybersecurity Conference ACM , DOI
Alohali M, Clarke N & Furnell S (2019) 'Information Security Risk Communication: A User-Centric Approach' 2019 IEEE/ACS 16th International Conference on Computer Systems and Applications (AICCSA) 1-/-1/20191-/-1/2019IEEE , DOI
Alotibi G, Clarke N, Li F & Furnell S (2019) 'The Feasibility of Using Behavioural Profiling Technique for Mitigating Insider Threats: Review' 5th International Conference on Computer Science, Information Technology Aircc Publishing Corporation , DOI Open access
Shaman F, Ghita B, Clarke N & Alruban A (2019) 'User Profiling Based on Application-Level Using Network Metadata' 2019 7th International Symposium on Digital Forensics and Security (ISDFS) 6-/-0/20196-/-0/2019IEEE , DOI Open access
Kuijs H, Bayer T, Reich C, Knahl M & Clarke N (2019) 'Privacy Enhancing Data Access Control for Ambient Assisted Living' 9th International Conference on Cloud Computing and Services Science 5-/-0/20195-/-0/2019SCITEPRESS - Science and Technology Publications , DOI Open access
Gantikow H, Reich C, Knahl M & Clarke N (2019) 'Rule-based Security Monitoring of Containerized Workloads' 9th International Conference on Cloud Computing and Services Science 5-/-0/20195-/-0/2019SCITEPRESS - Science and Technology Publications , DOI Open access
Alotaibi S, Alruban A, Furnell S & Clarke N (2019) 'A Novel Behaviour Profiling Approach to Continuous Authentication for Mobile Applications' 5th International Conference on Information Systems Security and Privacy 2-/-0/20192-/-0/2019SCITEPRESS - Science and Technology Publications , DOI Open access
Mashhadani S, Clarke N & Li F (2019) 'Identification and Extraction of Digital Forensic Evidence from Multimedia Data Sources using Multi-algorithmic Fusion' 5th International Conference on Information Systems Security and Privacy 2-/-0/20192-/-0/2019SCITEPRESS - Science and Technology Publications , DOI Open access
Alruban A, Alobaidi H, Clarke N & Li F (2019) 'Physical Activity Recognition by Utilising Smartphone Sensor Signals' 8th International Conference on Pattern Recognition Applications and Methods 2-/-0/20192-/-0/2019SCITEPRESS - Science and Technology Publications , DOI Open access
Abed L, Clarke N, Ghita B & Alruban A (2019) 'Securing Cloud Storage by Transparent Biometric Cryptography' Springer International Publishing 97-108 , DOI
Rieger T, Regier S, Stengel I & Clarke N (2019) 'Fast predictive maintenance in Industrial Internet of Things (IIoT) with Deep Learning (DL): A review' 69-79 Open access
Mohammed H, Clarke N & Li F (2018) 'Evidence Identification in Heterogeneous Data Using Clustering' ARES 2018: International Conference on Availability, Reliability and Security ACM , DOI
Al-Naffakh N, Clarke N & Li F (2018) 'Continuous user authentication using smartwatch motion sensor data' The 12th IFIP International Conference on Trust Management Toronto, Canada 7-/-0/20187-/-0/201815-28 , DOI Open access
Alshehri A, Clarke NL & Li F (2018) 'A Holistic Framework for Enhancing Privacy Awareness' 2018 21st Saudi Computer Society National Computer Conference (NCC) 4-/-0/20184-/-0/2018IEEE , DOI
Gaseb A, Nathan C, Fudong L & Furnell S (2018) 'The Current Situation of Insider Threats Detection: An Investigative Review' 2018 21st Saudi Computer Society National Computer Conference (NCC) 4-/-0/20184-/-0/2018IEEE , DOI
Alruban A, Clarke N, Li F & Furnell S (2018) 'Biometrically Linking Document Leakage to the Individuals Responsible' Springer International Publishing 135-149 , DOI
Da Veiga A, Vorster R, Li F, Clarke N & Furnell S (2018) 'A comparison of compliance with data privacy requirements in two countries'
Al-Bayati B, Clarke N, Dowland P & Li F (2018) 'Misuse Detection in a Simulated IaaS Environment' Springer International Publishing 103-115 , DOI
Al-Obaidi H, Li F, Clarke N, Ghita B & Ketab S (2018) 'A multi-algorithmic approach for gait recognition' 20-28
Al-Kawaz H, Clarke N, Furnell S, Li F & Alruban A (2018) 'Advanced facial recognition for digital forensics' 11-19
Mohammed H, Clarke N & Li F (2018) 'Automating the harmonisation of heterogeneous data in digital forensics' 299-306
Al-Bayati B, Clarke N, Dowland P & Li F (2018) 'Continuous identity verification in cloud storage services using behavioural profiling' 1-10
Mashhadani S, Al-kawaz H, Clarke N, Furnell S & Li F (2017) 'A novel multimedia-forensic analysis tool (M-FAT)' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20172-/-1/2017IEEE , DOI
Alotaibi F, Clarke N & Furnell S (2017) 'An analysis of home user security awareness & education' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20172-/-1/2017IEEE , DOI
Enamamu TS, Clarke N, Haskell-Dowland P & Li F (2017) 'Transparent authentication: Utilising heart rate for user authentication' 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20172-/-1/2017IEEE , DOI
Enamamu TS, Clarke N, Haskell-Dowland P & Li F (2017) 'Smart watch based body-temperature authentication' 2017 International Conference on Computing Networking and Informatics (ICCNI) 0-/-1/20170-/-1/2017IEEE , DOI
Al-Naffakh N, Clarke N, Li F & Haskell-Dowland P (2017) 'Unobtrusive Gait Recognition Using Smartwatches' 9-/-0/2017, DOI Open access
Alruban A, Clarke N, Li F & Furnell S (2017) 'Insider Misuse Attribution using Biometrics' ARES '17: International Conference on Availability, Reliability and Security ACM , DOI
Alohali M, Clarke N, Furnell S & Albakri S (2017) 'Information security behavior: Recognizing the influencers' 2017 Computing Conference 7-/-0/20177-/-0/2017IEEE , DOI
Alqahtany S, Clarke N, Furnell S & Reich C (2017) 'A forensic acquisition based upon a cluster analysis of non-volatile memory in IaaS' 2017 2nd International Conference on Anti-Cyber Crimes (ICACC) 3-/-0/20173-/-0/2017IEEE , DOI
Clarke N, Li F, Alruban A & Furnell S (2017) 'Insider Misuse Identification using Transparent Biometrics' Hawaii International Conference on System Sciences Hawaii International Conference on System Sciences , DOI Open access
Al-Naffakh N, Clarke N, Dowland P & Fudong Li (2016) 'Activity Recognition using wearable computing' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20162-/-1/2016IEEE , DOI Open access
Alotaibi M, Furnell S & Clarke N (2016) 'Information security policies: A review of challenges and influencing factors' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20162-/-1/2016IEEE , DOI
Alotibi G, Clarke N, Fudong Li & Furnell S (2016) 'User profiling from network traffic via novel application-level interactions' 2016 11th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20162-/-1/2016IEEE , DOI
Triantafyllidis A, Clarke N, Dowland P & Vranopoulos G (2016) 'INCREASING ELEARNING ENGAGEMENT USING MOBILE TECHNOLOGIES' International Technology, Education and Development Conference 1-/-1/20161-/-1/2016IATED , DOI
Alqahtany S, Clarke N, Furnell S & Reich C (2016) 'A Forensic Acquisition and Analysis System for IaaS: Architectural Model and Experiment' 2016 11th International Conference on Availability, Reliability and Security (ARES ) 8-/-0/20169-/-0/2016IEEE , DOI
Ketab S, Clarke N & Dowland P (2016) 'THE VALUE OF THE BIOMETRICS IN INVIGILATED E-ASSESSMENTS' International Conference on Education and New Learning Technologies 7-/-0/20167-/-0/2016IATED , DOI
Alruban A, Clarke N, Li F & Furnell S (2016) 'Proactive biometric-enabled forensic imprinting' 2016 International Conference On Cyber Security And Protection Of Digital Services (Cyber Security) 6-/-0/20166-/-0/2016IEEE , DOI
Kemmer F, Reich C, Knahl M & Clarke N (2016) 'Software Defined Privacy' 2016 IEEE International Conference on Cloud Engineering Workshop (IC2EW) 4-/-0/20164-/-0/2016IEEE , DOI
Kuijs H, Reich C, Knahl M & Clarke N (2016) 'A Scalable Architecture for Distributed OSGi in the Cloud' 6th International Conference on Cloud Computing and Services Science 4-/-0/20164-/-0/2016SCITEPRESS - Science and Technology Publications , DOI
Rübsamen T, Reich C, Clarke N & Knahl M (2016) 'Evidence Collection in Cloud Provider Chains' 6th International Conference on Cloud Computing and Services Science 4-/-0/20164-/-0/2016SCITEPRESS - Science and Technology Publications , DOI
Clarke N, Li F, Furnell S, Stengel I & Ganis G (2016) 'Information Security and Practice: The User's Perspective' 81-89
Gantikow H, Reich C, Knahl M & Clarke N (2016) 'Providing Security in Container-Based HPC Runtime Environments' Springer International Publishing 685-695 , DOI
Sherif E, Furnell S & Clarke N (2015) 'Awareness, behaviour and culture: The ABC in cultivating security compliance' 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20152-/-1/2015IEEE , DOI
Alotaibi S, Furnell S & Clarke N (2015) 'Transparent authentication systems for mobile device security: A review' 2015 10th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20152-/-1/2015IEEE , DOI
Li F, Clarke N, Alotibi G & Joy D (2015) 'Forensic Investigation of Network Traffic: A Study into the Derivation of Application-Level features from Network-Level Metadata' Annual International Conference on ICT: Big Data, Cloud and Security (ICT-BDCS 2015) Global Science and Technology Forum (GSTF) , DOI
Alqahtany S, Clarke N, Furnell S & Reich C (2015) 'Cloud Forensics: A Review of Challenges, Solutions and Open Problems' 2015 International Conference on Cloud Computing (ICCC) 4-/-0/20154-/-0/2015IEEE , DOI
Al Abdulwahid A, Clarke N, Furnell S, Stengel I & Reich C (2015) 'The Current Use of Authentication Technologies: An Investigative Review' 2015 International Conference on Cloud Computing (ICCC) 4-/-0/20154-/-0/2015IEEE , DOI
Al Abdulwahid A, Clarke N, Stengel I, Furnell S & Reich C (2015) 'A Survey of Continuous and Transparent Multibiometric Authentication Systems' 1-10
Sherif E, Furnell S & Clarke N (2015) 'An Identification of Variables Influencing the Establishment of Information Security Culture' Springer International Publishing 436-448 , DOI
Alotibi G, Li F, Clarke N & Furnell S (2015) 'Behavioral-Based Feature Abstraction From Network Traffic' 1-9
Ketab SS, Clarke NL & Dowland PS (2015) 'E-INVIGILATION OF E-ASSESSMENTS' 1582-1591
Al Abdulwahid A, Clarke N, Stengel I, Furnell S & Reich C (2015) 'Security, Privacy and Usability – A Survey of Users’ Perceptions and Attitudes' Springer International Publishing 153-168 , DOI
Alotaibi M, Furnell S & Clarke N (2015) 'Towards dynamic adaption of user's organisational information security behaviour' 28-36 , DOI
Kasiaras D, Zafeiropoulos T, Clarke N & Kambourakis G (2014) 'Android forensics: Correlation analysis' 2014 9th International Conference for Internet Technology and Secured Transactions (ICITST) 2-/-1/20142-/-1/2014IEEE , DOI
Li F, Clarke N, Furnell S & Mkwawa I-H (2014) 'Performance evaluation of a Technology Independent Security Gateway for Next Generation Networks' 2014 IEEE 10th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob) 0-/-1/20140-/-1/2014IEEE , DOI
Fajardo JO, Liberal F, Li F, Clarke N, Mkwawa I-H & Sun L (2014) 'Performance-driven evaluation for deploying IMS-based interoperability scenarios' ICC 2014 - 2014 IEEE International Conference on Communications 6-/-0/20146-/-0/2014IEEE , DOI
Frey S, Luthje C, Reich C & Clarke N (2014) 'Cloud QoS Scaling by Fuzzy Logic' 2014 IEEE International Conference on Cloud Engineering (IC2E) 3-/-0/20143-/-0/2014IEEE , DOI
Li F, Wheeler R & Clarke N (2014) 'An Evaluation of Behavioural Profiling on Mobile Devices' Springer International Publishing 330-339 , DOI
Saevanee H, Clarke N, Furnell S & Biscione V (2014) 'Text-Based Active Authentication for Mobile Devices' Springer Berlin Heidelberg 99-112 , DOI
Al Abdulwahid A, Clarke N, Furnell S & Stengel I (2014) 'A conceptual model for federated authentication in the cloud' 1-11
Alqahtany S, Clarke N, Furnell S & Reich C (2014) 'A forensically-enabled IAAS cloud computing architecture' 75-83 , DOI
Joy D, Li F, Clarke NL & Furnell SM (2014) 'A user-oriented network forensic analyser: The design of a high-level protocol analyser' 84-93 , DOI
AlFahdi M, Clarke NL & Furnell SM (2014) 'Towards an automated forensic examiner (AFE) based upon criminal profiling & artificial intelligence' 1-9
Doelitzscher F, Knahl M, Reich C & Clarke N (2013) 'Anomaly Detection in IaaS Clouds' 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom) 2-/-1/20132-/-1/2013IEEE , DOI
Al Fahdi M, Clarke NL & Furnell SM (2013) 'Challenges to digital forensics: A survey of researchers & practitioners attitudes and opinions' 2013 Information Security for South Africa 8-/-0/20138-/-0/2013IEEE , DOI
Li F, Clarke N, Furnell S, Oscar Fajardo J, Liberal F & Sidibe M (2013) 'A TECHNOLOGY INDEPENDENT SECURITY GATEWAY FOR FUTURE EMERGENCY TELECOMMUNICATION SYSTEMS (ETS)' 299-308
Li F, Clarke N & Furnell S (2013) 'A Technology Independent Security Gateway for Real-Time Multimedia Communication' Springer Berlin Heidelberg 14-25 , DOI
Clarke NL, Dowland P & Furnell SM (2013) 'e-Invigilator: A Biometric-Based Supervision System for e-Assessments' 238-242
Furnell S, Clarke N & Katos V (2013) 'Preface'
Liberal F, Ramos M, Oscar Fajardo J, Goia N, Bizkarguenaga A, Mesogiti J, Theodoropoulou E, Lyberopoulos G, Koumaras H & Sun L (2013) 'USER REQUIREMENTS FOR FUTURE WIDEBAND CRITICAL COMMUNICATIONS' 341-348
Clarke N, Katos V, Menesidou SA, Ghita B & Furnell S (2012) 'A novel security architecture for a space-data DTN' Springer Berlin/Heidelberg 342-349
Anuar N, Papadaki M, Furnell S & Clarke N (2012) 'A Response Strategy Model for Intrusion Response Systems' Springer Boston 573-578
Saevanee H, Clarke N & Furnell S (2012) 'Multi-modal Behavioural Biometric Authentication for Mobile Devices' Springer Boston 465-474
Thaul W, Bleimann U & Clarke N (2012) 'Personal knowledge management beyond versioning' 28-28
Doelitzscher F, Fischer C, Moskal D, Reich C, Knahl M & Clarke N (2012) 'Validating Cloud Infrastructure Changes by Cloud Audits' 377-384
Dagnall M & Clarke NL (2012) 'A feasibility study into tracking Wi-Fi enabled mobile devices' 85-92
Triantafyllidis A, Clarke NL & Dowland PS (2012) 'LEARNING MANAGEMENT SYSTEMS IN HIGHER EDUCATION: A STUDENT PERSPECTIVE' 4046-4055
Clarke N & Furnell S (2012) 'Preface'
Magaya RT & Clarke NL (2012) 'Web-based risk analysis for home users' 19-27
Thaul W, Bleimann U & Clarke N (2011) 'Personal knowledge management - Beyond versioning' 242-249
Doelitzscher F, Reich C, Knahl M & Clarke N (2011) 'An autonomous agent based incident detection system for cloud environments' 197-204
Li F, Clarke N, Papadaki M & Dowland P (2011) 'Behaviour Profiling for Transparent Authentication for Mobile Devices' 307-314
Doelitzscher F, Reich C, Knahl M & Clarke N (2011) 'Incident detection for cloud environments' 100-105
Lederm T & Clarke N (2011) 'Risk assessment for mobile devices' Springer Berlin/Heidelberg 210-221
Saevanee H, Clarke N & Furnell S (2011) 'SMS linguistic profiling authentication on mobile device' 224-228
Furnell S & Clarke N (2011) 'Preface'
Talib S, Clarke NL & Furnell SM (2010) 'An Analysis of Information Security Awareness within Home and Work Environments' 196-203 , DOI
Anuar NB, Papadaki M, Furnell S & Clarke N (2010) 'An investigation and survey of response options for Intrusion Response Systems (IRSs)' 1-8
Ibrahim T, Furnell SM, Papadaki M & Clarke NL (2010) 'Assessing the Usability of End-User Security Software' 177-189
Clarke N, Furnell S & Von Solms R (2010) 'Preface'
Shauchenka HV, Bleimann U, Knoll M & Clarke NL (2010) 'Service Quality Assessment in Distance Learning' 269-277
Stienne DS, Clarke N & Reynolds P (2009) 'Strong Authentication for web services using smartcards' 55-62
Clarke N & Dowland PS (2009) 'A CRITICAL EVALUATION OF OPAS (ONLINE PEER ASSESSMENT SYSTEM)' IATED 5124-5135
Ibrahim T, Furnell S, Papadaki M & Clarke N (2009) 'Assessing the Usability of Personal Internet Security Tools' 102-111
Clarke N, Karatzouni S & Furnell S (2009) 'Flexible and Transparent User Authentication for Mobile Devices' 1-12
Li F, Clarke NL & Papadaki M (2009) 'Intrusion Detection System for Mobile Devices: Investigation on Calling Activity'
Stienne DS, Clarke N & Reynolds P (2009) 'Strong Authentication for Web Services using Smartcards' 8-8
Furnell S & Clarke N (2009) 'Preface'
Buchoux A & Clarke NL (2008) 'Deployment of keystroke analysis on a Smartphone' 29-39
Ibrahim T, Furnell SM, Papadaki M & Clarke NL (2008) 'Assessing the Challenges of Intrusion Detection Systems'
Buchoux A & Clarke NL (2008) 'Deployment of keystroke analysis on a smartphone' 48-48
Tjhai GC, Papadaki M, Furnell SM & Clarke NL (2008) 'Investigating the problem of IDS false alarms: An experimental study using Snort' Springer 253-267
Tjhai GC, Papadaki M, Furnell SM & Clarke NL (2008) 'The problem of false alarms: Evaluation with Snort and DARPA 1999 dataset' 139-+
Clarke N & Furnell S (2008) 'Preface'
Karatzouni S, Clarke NL & Furnell SM (2007) 'Device-versus network-centric authentication paradigms for mobile devices: Operational and perceptual trade-offs' 117-126
Karatzouni S, Clarke NL & Furnell SM (2007) 'Utilising biometrics for transparent user authentication on mobile devices' 549-557
Razak SA, Furnell S, Clarke N & Brooke P (2007) 'Building a trusted community for mobile ad hoc networks using friend recommendation' 129-+
Karatzouni S, Clarke NL & Furnell SM (2007) 'Device-versus Network-Centric Authentication Paradigms for Mobile Devices' School of Computer and Information Science, Edith Cowan University, Perth, Western Australia
Karatzouni S, Furnell SM, Clarke NL & Botha RA (2007) 'Perceptions of user authentication on mobile devices' 11-13
Furnell S & Clarke N (2007) 'Proceedings of the International Symposium on Human Aspects of Information Security and Assurance (HAISA 2007)' University of Plymouth, School Of Computing, Communications And Electronics
Li F, Clarke N, Bolan C & Australia W (2007) 'User Perception of the Security & Privacy Concerns of RFID Technology' Lulu. com 156-156
Furnell S & Clarke N (2007) 'Preface'
Razak SA, Fumell S, Clarke N & Brooke P (2006) 'A two-tier intrusion detection system for mobile ad hoc networks - A friend approach' 590-595
Razak SA, Furnell S, Clarke N & Brooke P (2006) 'Part II-Short Papers-Infrastructure Protection and Cyber Security-A Two-Tier Intrusion Detection System for Mobile Ad Hoc Networks–A Friend Approach' Berlin: Springer-Verlag, 1973- 590-595
Clarke NL & Mekala AR (2006) 'Transparent handwriting verification for mobile devices' 277-287
Furnell S & Clarke N (2005) 'Organisational security culture: embedding security awareness, education and training' 67-74
Clarke N, Furnell S, Lines B & Reynolds P (2004) 'Application of keystroke analysis to mobile text messaging' 14-15
Clarke NL, Furnell SM, Lines BM & Reynolds PL (2003) 'Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets' 97-108
Clarke NL, Furnell SM, Lines BM & Reynolds PL (2003) 'Using keystroke analysis as a mechanism for subscriber authentication on mobile handsets' 97-108
Clarke NL, Furnell S, Lines BM & Reynolds PL (2002) 'Subscriber Authentication for Mobile Phones through the Implementation of Keystroke Dynamics' in Furnell S; Dowland PS University of Plymouth 347-355
Clarke NL, Furnell SM, Reynolds PL & Rodwell PM (2002) 'Advanced subscriber authentication approaches for third generation mobile systems' 319-323
Clarke NL, Furnell SM & Reynolds PL (2002) 'Biometric authentication for mobile devices' 61-69
Clarke N, Furnell S, Lines B & Reynolds P (2002) 'Subscriber authentication for mobile phones using keystroke dynamics' 16-18
Patents
A CONTAINER AND SECURITY SYSTEMS.
Adjusting an operating mode of a security container in response to an unexpected received radio signal. GB2472632 (A)
Method of Associating a Person with a Digital Object. WO/2017/207998
Presentations and posters
Al-Kawaz H, Clarke N, Furnell S & Li F Al-Kawaz H, Clarke N, Furnell S & Li F 'Facial-Forensic Analysis Tool' , DOI
Personal

Personal

Reports & invited lectures

  • Invited Lecturer, “Human Aspects of Cyber Security”, IPICS Summer School, Lesvos, Greece, July 2023   
  • Invited Presentation, “Usable Authentication – the drive to a frictionless experience”, Security4U Research Group, University of South Africa, May 2023
  • Invited Keynote, "Big Data - Challenges and Opportunities in Digital Forensics", 13th International Conference on Cloud Computing, Data Science and Engineering, January 2023
  • Invited Presentation, "Tackling Big Data in Digital Forensics", University of Wolverhampton, October 2022
  • Invited Presentation, "Advancing Digital Forensics through Artificial Intelligence", The Security Conference, Las Vegas, March 2021 (Online)
  • Invited Keynote, "Frictionless Authentication: The Panacea to the Problem?", 7th International Conference on Computer Science and Information Technology, Khartoum, Sudan, Jan 2020
  • Invited Presentation, "Maritime Cyber Threats", Marine and Maritime Cyber Security, Plymouth, November 2019
  • Invited Panel, "Cyber Security Skills: Do we know what we need?", Secure South West 13, Plymouth, October 2019
  • Invited Presentation, “Is Digital Forensics a Necessity for Organisations?”, University of Nevada (Reno), May 2019
  • Invited Lecturer, “Introduction to Digital Forensics”, IPICS Summer School, Lesvos, Greece, July 2018
  • Invited Presentation, “Cyber Security”, Romney Street Group, Athenaeum Club, London, 6th February 2018
  • Invited Briefing, House of Lords - Science and Technology Committee on Digital Forensics, 30th January 2018
  • Invited Panel, “Privacy, Encryption and Hacktivism: Is your Information Safe Online?”, Chatham House – The Royal Institute of International Affairs, London, UK, September 2017
  • Invited Lecturer, “Introduction to Digital Forensics”, IPICS Summer School, Corfu, Greece, June 2017
  • Invited Panel, “Insider Misuse”, The Security Conference, Las Vegas, April 2017
  • Invited Presentation, “Usable Authentication”, City University, March 2017
  • Invited Panel, “Cybercrime, Can we Keep Up?”, Plymouth University, February 2017
  • Invited Lecturer, “Introduction to Cloud Security & Forensics”, IPICS Summer School, Ghent, Belgium, July 2016
  • Invited Lecturer, “Introduction to Cloud Security & Forensics”, IPICS Summer School, Lesvos, Greece, July 2015
  • Invited Presentation, “Transparent & Continuous Authentication”, De Montfort University, 11th March 2015
  • Invited Presentations, “Digital Forensic Challenges & Research”, ESIEA – Sciences et Technologies du Numerique, Paris, 23rd February 2015
  • Invited Presentation, “Continuous Authentication”, Princess Nora University, Saudi Arabia, 27th November 2014
  • Invited Presentation, “Active Authentication: The Natural Evolution”, Biometrics 2014, London, 21st October 2014
  • Invited Lecturer, Digital Forensics, IPICS Summer School, Lesvos, Greece, July 2014
  • Invited Scholar, University of Fort Hare, South Africa, April 2014
  • Invited Presentation, “The Role of Digital Forensics within Organisations”, Secure South West, Plymouth, December 2013
  • Invited Presentation, "Information Security: Impacts and Consequences", Brunel University, London, November 2010 
  • Invited Presentation, “Security and Privacy”, Brunel University, London, UK, November 2009
  • Invited Presentation, “The Future of Biometrics in E-Learning Systems”, Biometric Consortium Conference, Florida, USA, September 2009
  • Invited Presentation, "Effective User Authentication for Mobile Devices", University of Nevada, London, July 2009 
  • Invited Presentation, "Applications Security", University of Tunis-Carthage, Tunis, Tunisia, March, 2009 
  • Invited Presentation, "Biometrics - No Silver Bullet", University of Portsmouth, Portsmouth, UK, January 2009
  • Invited Lecturer, IPICS Summer School, Regensburg, Germany, July 2008
  • Invited Presentation, "Flexible and Transparent User Authentication for Mobile Devices", Oviedo, Spain, May 2008
  • Invited Presentation, "User Authentication for Mobile Devices", University of Portsmouth, Portsmouth, UK, March 2007
  • Invited Presentation, "Biometric Authentication for Mobile Devices", Aston University, Birmingham, UK, February 2007
  • Keynote Speech, The Art of Computing Technology 2006, "Biometrics: The Future of Personal Authentication", University of Technology Malaysia, March 2006
  • Invited Lecturer/Scholar, University of Technology Malaysia, March/April 2006
  • Keynote Speech, 11th Conference on Human Computer Interaction, "Biometrics: The Promise Versus the Practice", Oviedo, Spain, 22-24 March 2006
  • Invited Lecturer/Scholar, Nelson Mandela Metropolitan University, August/September 2005
  • Invited Lecturer, IPICS Summer School, Chios, Greece, July 2005
  • Invited Lecturer, IPICS Winter School, Oulu, Finland, April 2005

Conferences organised

  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2024), Skovde, Sweden, July 2024
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2023), Kent, UK, July 2023
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2022), Lesvos, Greece, July 2022
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2021), Online, July 2021
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2020), Online, July 2020
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2019), Nicosia, Cyprus, July 2019
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2018), Glasgow, Scotland, July 2018
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2017), Adelaide, Australia, November 2017
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2016), Frankfurt, Germany, July 2016
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2015), Lesvos, Greece, July 2015
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2014), Plymouth,UK, June 2014 
  • Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2014), Plymouth, UK, June 2014
  • Chair: Emergency Telecommunication Systems (ETS 2013) special track, Wrexham, UK, September 2013
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2013), Lisbon, Portugal, May 2013 
  • Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2013), Lisbon, Portugal, May 2013
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2012), Crete, Greece, June 2012 
  • Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2012), Crete, Greece, June 2012
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2011), Kingston University, United Kingdom 
  • Co-Chair: Workshop in Digital Forensics & Incident Analysis (WDFIA 2011), Kingston University, United Kingdom
  • Co-Chair: Workshop on Digital Forensics and Incident Analysis (WDFIA 2010), Port Elizabeth, South Africa, May 2010.
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2010), Port Elizabeth, South Africa, May 2010.
  • Co-Chair: Workshop on Digital Forensics and Incident Analysis (WDFIA 2009), Athens, Greece, June 2009.
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2009), Athens, Greece, June 2009. 
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2008), Plymouth, UK, July 2008. 
  • Co-Chair: Human Aspects of Information Security & Assurance (HAISA 2007), Plymouth, UK, July 2007. 
  • Track Chair: Mobility & Security, 6th Security Conference, Las Vegas, USA, April 2007. 
  • Local organising committee: International Networking Conference (INC2006), Plymouth, UK, July 2006. 
  • Local organising committee: International Networking Conference (INC2004), Plymouth, UK, July 2004 

Other academic activities

Journal Editorships/Reviewing:
Current Journal Editorships:
  • Editorial Board Member, Computers & Security, Elsevier
  • Editorial Board Member, Journal of Information Security, Springer
  • Editorial Board Member, International Journal of Cyber Warfare and Terrorism, IGI Global
  • Sub Editor, South African Computer Journal, South African Institute of Computer Scientists and Information Technologists.
Previous Journal Editorships:
  • Associate Editor, KIIS Transactions on Internet and Information Systems, KIIS
  • Associate Editor, Security & Communication Networks, John Wiley 
  • Associate Editor, Communications and Computer Security, ACTA Press
  • Editorial Board Member, Future Internet, MDPI Publishing.
  • Editorial Board Member, Mobile Computing, World Academic Publishing 
Guest Editor:
  • Information & Computer Security, Vol. 31, No. 3, 2023
  • Information & Computer Security, Vol. 29, No. 4, 2021
  • Information & Computer Security, Vol. 26, No. 3, 2018
  • Information & Computer Security, Vol. 24, No. 2, 2016
  • Computers & Security (Special Section on Active Authentication), Vol. 39, Part B. 
  • Information Management & Computer Security, Vol. 21, No. 1, 2013
  • International Journal of Digital Crime and Forensics, Vol. 4, No. 4, 2012
  • International Journal of Digital Crime and Forensics, Vol. 3, No. 3, 2011 
  • Information Management & Computer Security, Vol. 18, No. 1, 2010 
  • Information Management & Computer Security, Vol. 18, No. 5, 2010 
  • Information Management & Computer Security, Vol. 17, No. 1, 2009 
  • Information Management & Computer Security, Vol. 15, No. 5, 2007 
Journal Referee:
  • Computer Standards and Interfaces, Elsevier
  • Computers & Security, Elsevier
  • EURASIP Journal on Advances in Signal Processing, Springer
  • IEEE Communications Surveys and Tutorials
  • IEEE Journal on Selected Areas in Communications Special Issue on Advances in Digital Forensics for Communications and Networking
  • IEEE Transactions on Cybernetics, IEEE
  • IEEE Transactions on Human-Machine Systems, IEEE
  • IEEE Transactions on Information Forensics & Security, IEEE
  • IET Information Security, IET
  • IET Signal Processing, IET
  • Information Security Journal: A Global Perspective
  • Information Security Technical Report, Elsevier
  • International Journal of Computer Science and Security, Computer Science Journals
  • International Journal of Electronic Governance (IJEG), Inderscience
  • International Journal of Information Technologies and Systems Approach, IGI Global
  • International Journal of Interdisciplinary Telecommunications & Networking, IGI Global.
  • International Journal of Pattern Recognition and Artificial Intelligence, World Scientific.
  • Internet Research, Emerald
  • Journal for Information Warfare
  • Information Sciences, Elsevier
  • Journal of Internet Services and Applications, Springer. 
  • Journal of Mobile Networks & Applications, Springer
  • Journal of Network and Computer Applications, Elsevier
  • Journal of Systems and Software, Elsevier Referee, 
  • Journal on Personal and Ubiquitous Computing: Special Issue: Security and Trust in Context-Aware Systems, Springer
  • KSII Transactions on Internet and Information Systems
  • Recent Patents in Computer Science, Bentham Science
  • Security & Communication Networks, John Wiley & Sons
  • The Computer Journal, Oxford Journals

Links

The Centre's research website can be located at: www.cscan.org

Related articles on the University website